Abstract:
Customer edge (CE) to CE device verification checks initiate routes from available CEs as a set of path verification messages, destined for remote CE routes serving a remote VPN. An extended community attribute, included among the attributes of the path verification message, stores the identity of the originating CE router. The path verification message propagates across the network, and transports the identity of the originating CE router because the originator identity is not overwritten by successive routing. Upon receipt by the remote CE, the originator is determinable from the extended community attribute. A further reachability field is also included in the extended community attribute and indicates whether per CE or per prefix is appropriate for the particular route in question. In this manner, CE-CE connectivity checks identify CEs which are reachable from other CEs. Accordingly, such a mechanism allows for route reachability aggregation on a per-CE or per prefix reachability basis.
Abstract:
An example method is provided in one example embodiment and includes receiving a packet of a session from a previous hop router at a service zone of a service chain; recording the previous hop router for the session; determining an appliance to service the packet in the service zone using load balancing; recording an appliance identity for servicing the session in the service zone; determining a next hop router in the service chain for the packet using load balancing; and recording the next hop router for the session.
Abstract:
A method for load balancing based on metadata in a network service header. The method includes receiving a packet or frame of a traffic flow, wherein the packet or frame has a payload and the network service header including metadata and service path information for the traffic flow identifying the service path, and the metadata comprises classification information of the packet or frame, extracting, by a service header processor of the load balancer, the classification information of the metadata from the packet or frame, and applying, by a load balancing function of the load balancer, a load balancing policy on the packet or frame based on the classification information of the metadata.
Abstract:
Embodiments are provided for optimized best path selection for optimal route reflection and include configuring, by a cloud-based node, a first cluster of nodes in an autonomous system, and determining whether any paths for a network address prefix are available in the first cluster of nodes. Embodiments also include selecting a best path from one or more paths if the one or more paths are determined to be available in the first cluster for the network address prefix. Embodiments further include advertising the best path to one or more nodes in the first cluster. More specific embodiments include determining, if no paths for the network address prefix are available in the first cluster, another path for the network address prefix is available in a second cluster of nodes of the autonomous system, and selecting the other path as the best path.
Abstract:
A fast reroute (FRR) technique is implemented at the edge of a computer network. In accordance with the technique, if an edge device detects a node or link failure that prevents it from communicating with a neighboring routing domain, the edge device reroutes at least some data packets addressed to that domain to a backup edge device which, in turn, forwards the packets to the neighboring domain. The rerouted packets are designated as being "protected" (i.e., rerouted) data packets before they are forwarded to the backup edge device. To that end, the edge device incorporates an identifier into the rerouted data packets to indicate that the packets are being FRR rerouted. The identifier may be a predetermined value stored at a known location in the rerouted packets' encapsulation headers, such as in their MPLS or IP headers. Upon receiving a data packet containing the identifier, the backup edge device is not permitted to reroute the packet a second time.
Abstract:
A method and apparatus for modifying the configuration of a network device, such as a router, using a two-stage configuration model is provided. A first request for a change in configuration of a network device is received. Configuration data that describes the change in configuration of the network device is stored in a buffer. A second request to modify the current operational state of the network device to reflect the configuration data stored in the buffer is received. An exclusive lock on the network device is obtained. The current operational state of the network device is modified to reflect the configuration data stored in the buffer. Multiple users may modify the network device without interfering with one another because conflicts are avoided through use of an exclusive lock. Requests of different management operations may be contained within XML documents that are transmitted from the client to the network device.
Abstract:
Embodiments are provided for providing optimal route reflector (ORR) root address assignment to route reflector clients and fast failover capabilities in an autonomous system, including identifying a first node in an autonomous system as a candidate root node of a first routing group, identifying a client node based on a neighbor address used in a first routing protocol, mapping the neighbor address to routing information received from the client node via a second routing protocol, and associating the neighbor address with the first routing group if the routing information includes an identifier of the first routing group. In more specific embodiments, identifying the first node as a candidate root node includes determining the first node and the first routing group are advertised in a first protocol packet, and determining the first node and the second routing group are advertised in a second protocol packet.
Abstract:
In one embodiment, a packet and a segment ID stack is received at a node. The segment ID stack includes a plurality of segment IDs, one of which is a first area-segment ID that identifies a first area of a subdivided network. One of a plurality of forwarding tables at the node is selected based on the first area-segment ID. Thereafter, the packet is forwarded based on information contained in the selected forwarding table.
Abstract:
In one embodiment, a communications distribution process maintains at least two pseudowires through a network such that the pseudowires share a burden of delivering data through the network. The communications distribution process receives feedback data concerning operation of each pseudowire. The communications distribution process utilizes the feedback data to distribute communications to the common destination across each of the pseudowires. Additionally, the communications distribution process utilizes the feedback to establish at least one new pseudowire, in addition to the first pseudowire and the second pseudowire, for transmission of data traffic.
Abstract:
A path verification protocol (PVP) which enumerates a series of messages sent to a set of nodes, or routers, along a network path identifies connectivity and transmission characteristic attributes by defining, implementing, and analyzing path verification messages (PVMs) in a VPN environment. Configurations herein provide a mechanism for determination of paths and/or routes that satisfy a QoS or other delivery speed/bandwidth guarantee. Such a mechanism may therefore be employed to perform routing decisions for QoS based traffic. Further, such a mechanism is employable to verify QoS levels and related attributes related to contractual terms between service providers and customers.